cybersecsi / invisible-backdoor-detectorView external linksLinks
A quick script to spot the usage of Unicode Bidi (bidirectional) characters that could lead to an Invisible Backdoor
☆34Nov 17, 2022Updated 3 years ago
Alternatives and similar repositories for invisible-backdoor-detector
Users that are interested in invisible-backdoor-detector are comparing it to the libraries listed below
Sorting:
- Take domains on stdin and output them on stdout if they get resolved☆32May 27, 2022Updated 3 years ago
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- Finding sensitive information in the trimmed parts of cropped images☆29Jan 5, 2022Updated 4 years ago
- Cmdlets for capturing Windows Events☆14Mar 11, 2022Updated 3 years ago
- A Multi-Threaded PE Export Collection Utility☆14May 13, 2023Updated 2 years ago
- Perform arp spoofing attack in C☆14Aug 18, 2023Updated 2 years ago
- ☆23Nov 29, 2023Updated 2 years ago
- ShootCutMe an .LNK file creator tool for redteamer☆14Oct 2, 2024Updated last year
- A mini project to exfiltrate data via QR codes☆19Dec 5, 2025Updated 2 months ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- A utility that can be used to launch an executable with a DLL injected☆19Nov 20, 2023Updated 2 years ago
- All your layer are belong to us☆21Jan 29, 2014Updated 12 years ago
- RustHunter is a modular incident response framework based on Rust and Ansible to build and compare environmental baselines.☆18Nov 12, 2025Updated 3 months ago
- Timestomp Tool to flatten MAC times with a specific timestamp☆49Dec 7, 2025Updated 2 months ago
- the Open Source and Pure C++ Packer for eXecutables☆21Mar 25, 2023Updated 2 years ago
- Exfiltration based on custom X509 certificates☆26Feb 23, 2024Updated last year
- Virtual machine introspection library based on libvmi - parts of this work have been funded by Deutsche Forschungsgemeinschaft (DFG) – pr…☆31Mar 3, 2022Updated 3 years ago
- A C++17 framework designed to enable obfuscation of constants, variables, and strings.☆23Nov 6, 2023Updated 2 years ago
- A nostalgic journey back to the era of retro RPGs with a cyber twist in the theme of Die Hard☆31Sep 2, 2023Updated 2 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37May 15, 2018Updated 7 years ago
- A binary hardening system☆113Sep 30, 2023Updated 2 years ago
- AMSI detection PoC☆31Apr 14, 2020Updated 5 years ago
- Scripts to secure and harden Mac OS X☆30Nov 16, 2021Updated 4 years ago
- A container-based framework to enable the integration of mobile components in security training platforms☆184Sep 12, 2022Updated 3 years ago
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆35Oct 31, 2023Updated 2 years ago
- Right-To-Left Override POC☆36Mar 21, 2022Updated 3 years ago
- PHP lab to test captcha bypassing☆30Jan 8, 2024Updated 2 years ago
- Powershell Network Scanner☆37Jan 20, 2020Updated 6 years ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Jun 28, 2023Updated 2 years ago
- Python wrappers for mal_unpack☆37Sep 19, 2023Updated 2 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆134Jan 31, 2022Updated 4 years ago
- AntiRansomware Linux Kernel Module☆37May 25, 2023Updated 2 years ago
- Reasonably undetected shellcode stager and executer.☆36May 23, 2025Updated 8 months ago
- A DLL that serves OutputDebugString content over a TCP connection☆35Sep 23, 2021Updated 4 years ago
- ☆38Jun 5, 2023Updated 2 years ago
- ☆35Nov 16, 2023Updated 2 years ago
- Windows Etw LPE☆51Oct 12, 2021Updated 4 years ago
- Card Payments Simulation Tool For Indie Devs : Core Card Switch Engine, Fraud Engine, ATM/POS GUI Simulator , Admin Dash (Real-time MSG …☆19Jun 15, 2025Updated 8 months ago
- HTTP request smuggling attack helper/CLI tools to manipulate HTTP packets☆35Sep 23, 2022Updated 3 years ago